Search

Showing total 643 results
643 results

Search Results

1. Counter Terrorism on Online Social Networks Using Web Mining Techniques

2. A Model for Characterizing Cyberpower

4. Ten National Cyber Security Strategies: A Comparison

5. Words Matter: Privacy, Security, and Related Terms

6. CII Protection - Lessons for Developing Countries: South Africa as a Case Study

7. The Challenges of Seeking Security While Respecting Privacy

15. Weiss, Linda: America Inc.? Innovation and enterprise in the National Security State: Cornell University Press, Ithaca, 2014, 280 pp., Paper, $24.95, ISBN-13: 978-0801479304.

16. CHINA'S MILITARY STRATEGY WHITE PAPER: WHAT DOES IT MEAN FOR THE REGION?

17. WHITE PAPER GIVES THE GO-AHEAD.

20. Forecasting Political Security Threats: A Fusion of Lexicon-Based and ML Approaches

22. PRC Overseas Political Activities : Risk, Reaction and the Case of Australia

23. Social Security in the Moscow Region Within the Eurasian Integration

24. From Extraction to Reparation: American National Security and Territorial Adaptation in the Climate Crisis

25. The Impact of the Internet on Terrorism and Violent Extremism

26. Paper dragon.

28. The Growing Dimensions of Security : The Atlantic Council's Working Group on Security

30. High-Tech CluFigrs as a Basis for Improving the Russian Defense Industrial Complex with Respect to Digitalization

31. CALL FOR PAPERS: EW SAUDI ARABIA 2013.

32. NHSC releases white paper on protection priorities.

33. Defence white paper needed.

34. Fake News Detection Using Machine Learning

35. IUU Fishing in Malaysia: A Gateway to Transnational Crime?

36. I SPY.

37. A Conceptual Framework for Social Movements Analytics for National Security

38. Reconstructing China’s Participation in the Global Order

40. Vietnam says papers violate state secrets.

44. Middle East Energy Policy Transformation: Saudi Case

46. Future Indonesia’s Migration Landscape and Border Control Policy : Facilitation and Security

47. Anti-corruption Strategies: Forms and Mechanisms of Participation of Civil Society Institutions

50. Corruption as a Threat to State Security: 'Confiscation in Rem' as a Problem Solution